MD5 hash for « 感觉她对我也没意思,加了她好友,她又删了,我就不想加了,怕被拒绝,犯这个贱干嘛。我就想看看她有多么爱他的(皇)(黄灿 备注是皇)。赶着在情人节前又搞一个吗?你可以看她头像…我不知道她的意思,傻傻的等着呢,她呢?经过我同意了吗就在指教搞对象。我呢,也是她发过来“姐姐我脱单了”才搞的,她们一起吃过饭,玩过,很嗨啊 。黄灿距离我家2㎞多。 »

The MD5 hash of 感觉她对我也没意思,加了她好友,她又删了,我就不想加了,怕被拒绝,犯这个贱干嘛。我就想看看她有多么爱他的(皇)(黄灿 备注是皇)。赶着在情人节前又搞一个吗?你可以看她头像…我不知道她的意思,傻傻的等着呢,她呢?经过我同意了吗就在指教搞对象。我呢,也是她发过来“姐姐我脱单了”才搞的,她们一起吃过饭,玩过,很嗨啊 。黄灿距离我家2㎞多。 is ef1b7684f6c87854ab33f52e8c27a16a

You can attempt to reverse the MD5 hash which was just generated, to reverse it into the originally provided string:

Reverse a MD5 hash

Feel free to experiment MD5 hashing with more strings. Just enter a new string and submit the form to convert it into another MD5 hash.

Convert a string to a MD5 hash

What is a MD5 hash?

MD5 (Message Digest algorithm, 5th version) is an algorithm which converts a given sequence of characters into another unique sequence of characters, with a fixed length, called "hash". For instance, the MD5 hash of the word password is 5f4dcc3b5aa765d61d8327deb882cf99.

These hashes are mostly used to validate file integrity, to encrypt sensitive data (like passwords), and to generate unique identifiers.

Is it secure?

MD5 hashes are theoretically impossible to reverse directly, ie, it is not possible to retrieve the original string from a given hash using only mathematical operations.

Most web sites and applications store their user passwords into databases with MD5 encryption. This method appears to be safe as it seems impossible to retrieve original user passwords if, say, a hacker manages to have a look at the database content.

Unfortunately, there is a way to decrypt a MD5 hash, using a dictionary populated with strings and their MD5 counterpart. As most users use very simple passwords (like "123456", "password", "abc123", etc), MD5 dictionaries make them very easy to retrieve.

This website uses a MD5 reverse dictionary containing several millions of entries, which you can use with MD5 hashes from your application.

If some of the hashes you enter can be reversed, consider using another way of generating hashes, like using stronger algorithms (SHA-2, Whirlpool, etc), combining algorithms, and using a "salt".